Module 1.8 Flashcards

1
Q

how do ICTS influence our lives & lifestyles? (7)

A
  • jobs we do
  • way we store & watch photos & vids
  • way we entertain ourselves
  • way we shop & do banking
  • way we communicate
  • way we interact with others
  • way we obtain & use info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

give 3 examples ICT provides us with ways to communicate

A
  • social networking sites
  • instant messaging
  • email
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what tasks can computers do for you in home offices

A
  • typing & editing documents
  • keeping track of your accounts
  • communicating with clients & suppliers
  • filing & organizing client data, contacts, etc
  • advertising product/service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ICT use in management of a school (5)

A
  • create timetables
  • word processor - produce exams
  • communicate with parents
  • calculate marks
  • market the school
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ICT use by teachers for lessons (4)

A
  • data projectors
  • electronic whiteboards
  • worksheets - word processor
  • computer programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ICT use by learners (9)

A
  • retrieve info
  • process data
  • type up neat assignments
  • create pictures
  • take photos
  • record interviews
  • watch vids
  • social networking websites
  • computer programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are identity thief’s?

A

people who steal another persons / company’s identity in the form of confidential details so they can pretend to be the company / person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what can computer criminals use your info to do? (4)

A
  • gain access to secret documents
  • obtain credit/ loans
  • spread false info
  • commit a crime against someone else
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how do scammers / phishers steal from you? (4)

A
  • use phishing techniques
  • set up fake websites that look like real businesses
  • scaring you with fake virus alarms
  • offering lottery winnings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

why can employees sometimes be a flight risk?

A

easily accessed to computers in company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what’s the difference between a hacker and a cracker

A
  • hacker : hired by companies to trace bugs abs test security
  • cracker : intentions of preforming a crime

white hat vs black hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are some examples of criminal activities with a computer? (4)

A
  • running spam businesses
  • stealing secrets
  • copying & selling DVDS illegally
  • using computers and printers to forge large documents
How well did you know this?
1
Not at all
2
3
4
5
Perfectly